Question No: 61 – (Topic 6)

You need to ensure that a user named User1 can prevent the deletion of every email message that contains a specific word from all of the mailboxes. The solution must

Add User1 to the Records Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.

Add User1 to the Records Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.

Add User1 to the Discovery Management management role group. Instruct User1 to run the New-ManagedContentSettings cmdlet.

Add User1 to the Discovery Management management role group. Instruct User1 to run the New-MailboxSearch cmdlet.

Answer: D Explanation:

If you want users to be able to use Microsoft Exchange Server 2013 In-Place eDiscovery, you must first authorize them by adding them to the Discovery Management role group.

Members of the Discovery Management role group have Full Access mailbox permissions for the Discovery mailbox that#39;s created by Exchange Setup.

The New-MailboxSearch cmdlet creates an In-Place eDiscovery search or an In-Place Hold. Unless specified, mailboxes on all Exchange 2013 servers in an organization are searched. You can stop, start, modify, or remove the search.

Question No: 62 HOTSPOT – (Topic 6)

You have an Exchange Server 2013 organization that has mailbox audit logging enabled for all users.

You deploy two third-party applications named App1 and App2. Both applications access a mailbox named Mailbox1.

You need to prevent the audit logs from containing entries that relate to App2.

Answer:

Explanation:

Note:

* Set-MailboxAuditBypassAssociation

Use the Set-MailboxAuditBypassAssociation cmdlet to configure mailbox audit logging bypass for user or computer accounts such as service accounts for applications that access mailboxes frequently.

When you configure a user or computer account to bypass mailbox audit logging, access or

reduce the noise in mailbox audit logs.

/ AuditBypassEnabled

The AuditBypassEnabled parameter specifies whether audit bypass is enabled for the user or computer. Valid values include the following:

$true. Enables mailbox audit logging bypass

$false. Disables mailbox audit logging bypass

Question No: 63 HOTSPOT – (Topic 6)

You have an Exchange Server 2013 organization that contains four servers named EX1, EX2, EX3, and EX4. All of the servers run Windows Server 2012 R2 and are members of a database availability group (DAG) named DAG1. All of the mailbox databases replicate to all of the Mailbox servers.

From EX1, you run the Get-ClusterNode | fl cluster, state,*name*,*weight* command and you receive the following output.

Use the drop-down menus to select the answer choice that completes each statement.

Answer:

Explanation:

* up to one more node

would still be operational if either of these nodes fail.

Important:

The advantage of Dynamic Quorum, is that it is now possible for a cluster to run even if the number of nodes remaining in the cluster is less than 50%! By dynamically adjusting the quorum majority requirement, the cluster can sustain sequential node shutdowns down to a single node and still keep running.

A DynamicWeight value of 1 indicates the node has a vote, and a value of 0 indicates the node does not have a vote.

Note: Windows Server 2012 introduced a new model called Failover Clustering Dynamic Quorum, which we can use with Exchange. When using Dynamic Quorum, the cluster dynamically manages the vote assignment to nodes based on the state of each node.

When a node shuts down or crashes, it loses its quorum vote. When a node successfully re-joins the cluster, it regains its quorum vote. By dynamically adjusting the assignment of quorum votes, the cluster can increase or decrease the number of quorum votes that are required to keep it running. This enables the cluster to maintain availability during sequential node failures or shutdowns.

Both Ex1 and Ex2 go offline

The idea behind DQ (Dynamic Quorum) is that, by adjusting the assignment of quorum votes and dynamically increasing or decreasing the number of quorum votes required to keep running, the cluster can sustain sequential node shutdowns (or failures) all the way down to a single node (referred to as a 鈥渓ast man standing鈥?.

Question No: 64 – (Topic 6)

You have an Exchange Server 2013 organization.

You successfully migrate the public folders from a previous version of Exchange Server. You discover that one of the public folder mailboxes almost reached its quota size.

You need to move some of the public folders in the public folder mailbox to another public folder mailbox.

Merge-PublicFolderMailbox.ps1

Split-PublicFolderMailbox.ps1

Set-MailPublicFolder

Set-PublicFolder

Answer: B Explanation:

Split-PublicFolderMailbox.ps1

Splits the given public folder mailbox based on the size of the folder

Note: If the content of a public folder mailbox begins to exceed your mailbox quotas, you may need to move public folders to a different public folder mailbox. There are a couple ways to do this. To move one or more public folders that don’t contain subfolders, you can use the PublicFolderMoveRequest cmdlets.

Move a single public folder

This example starts the move request for the public folder \CustomerEnagagements from the public folder mailbox DeveloperReports to DeveloperReports01

Merges the contents of the given public folder mailbox with the targetpublic folder mailbox. Not C: Use the Set-MailPublicFolder cmdlet to configure the mail-related settings of mail- enabled public folders.

Not D: Use the Set-PublicFolder cmdlet to set the attributes of public folders.

Reference: Move a public folder to a different public folder mailbox https://technet.microsoft.com/en-us/library/jj906435(v=exchg.150).aspx

Question No: 65 – (Topic 6)

A user named User1 has a mailbox that is enabled for Unified Messaging (UM). User1 has nine call answering rules.

When User1 attempts to create a new call answering rule, the user receives an error message.

You need to identify what prevents User1 from creating a call answering rule. What should you identify?

The mailbox of User1 has the CallAnsweringRulesEnabled parameter set to $false

The UM mailbox policy of User1 has the AllowCallAnsweringRules parameter set to

$false.

User1 exceeds the Inbox rules storage quota.

User1 has the maximum number of call answering rules allowed.

Answer: D Explanation:

A total of nine call answering rules can be set up for each UM-enabled mailbox.

Question No: 66 – (Topic 6)

Your company has an Exchange Server 2013 organization named Contoso.

A partner company has an Exchange Server 2013 organization named Fabrikam. Neither company has any trusts between their forests.

Users from both organizations access their mailbox from the Internet by using Outlook Anywhere.

You need to ensure that the users from both organizations can share free/busy information. Which two cmdlets should you run? (Each correct answer presents part of the solution.

New-AcceptedDomain

Add-AvailabilityAddressSpace

Set-AvailabilityConfig

New-SharingPolicy

Add-ADPermission

Answer: B,D Explanation:

B: Use the Add-AvailabilityAddressSpace cmdlet to define the access method and associated credentials used to exchange free/busy data across forests.

D: Use the New-SharingPolicy cmdlet to create a sharing policy to regulate how users inside your organization can share calendar and contact information with users outside the organization. Users can only share this information after federation has been configured in Exchange.

Question No: 67 HOTSPOT – (Topic 6)

You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table.

All of the mailbox databases replicate to all of the servers.

connect to site2-mail.contoso.com to access their mailbox. All of the users use Microsoft Outlook 2013.

You need to identify which DNS modification must be made to fail over the email services from Site1 to Site2.

Which DNS modification should you identify? (To answer, select the appropriate record to modify and the new data for the record in the answer area.)

Answer:

Question No: 68 – (Topic 6)

Your company has three offices. Each office has 1,000 users and is configured as an Active Directory site. Each site connects directly to the Internet.

The network contains six servers that have Exchange Server 2013 installed. The servers are configured as shown in the following table.

An administrator performs a datacenter switchover by changing the DNS record for webl.adatum.com to point to the IP address of web2.adatum.com.

Users from Main1 report that when they connect to Outlook Web App, they receive a certificate warning message.

You need to recommend a solution to ensure that the users do not receive a certificate warning message when a datacenter switchover is performed.

What should you include in the recommendation?

Three host headers for the Default Web Site on each Client Access server

One certificate that contains all of the external names as subject alternative names

Three certificates that each contains one of the external names

An external URL for each Client Access server set to $null

Answer: B Explanation:

SAN Certificates (Subject Alternative Names)

This type of certificate allows more than a single name in a single SSL certificate which makes total sense for the new Microsoft products (Lync and Exchange) because several services are using names and all of them are underneath the same IIS Web Site. In some Public CA these certificates are also known as UC Certificates.

Reference: Managing Certificates in Exchange Server 2013

Question No: 69 DRAG DROP – (Topic 6)

Your company has two offices. Each office is configured as an Active Directory site. The sites are named Site1 and Site2.

You have an Exchange Server 2013 organization that is configured as shown in the following exhibit. (Click the Exhibit button.)

Which four commands should you run in sequence? (To answer, move the appropriate four commands from the list of commands to the answer area and arrange them in the correct order. More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.)

Answer:

Target 2:

Target 3:

Target 4:

Step 1: Terminating a Partially Failed Datacenter

When the DAG is in DAC mode, the specific actions to terminate any surviving DAG members in the primary datacenter are as follows:

The DAG members in the primary datacenter must be marked as stopped in the primary datacenter. Stopped is a state of Active Manager that prevents databases from mounting, and Active Manager on each server in the failed datacenter is put into this state by using the Stop-DatabaseAvailabilityGroup cmdlet.

Step 2-4: Activating Mailbox Servers

The steps needed to activate Mailbox servers during a datacenter switchover also depend on whether the DAG is in DAC mode. Before activating the DAG members in the second

When the DAG is in DAC mode, the steps to complete activation of the mailbox servers in the second datacenter are as follows:

(step 2, step 3) The Cluster service must be stopped on each DAG member in the second datacenter. You can use the Stop-Service cmdlet to stop the service (for example, Stop-Service ClusSvc), or use net stop clussvc from an elevated command prompt.

(step 4) The Mailbox servers in the standby datacenter are then activated by using the Restore-DatabaseAvailabilityGroup cmdlet. The Active Directory site of the standby datacenter is passed to the Restore-DatabaseAvailabilityGroup cmdlet to identify which servers to use to restore service and to configure the DAG to use an alternate witness server.

Question No: 70 HOTSPOT – (Topic 6)

You have an Exchange Server 2013 organization.

You run Get-OutlookAnywhere -Server EX1 | fl and you receive the following output.

Answer:

Explanation:

*Basic Authentication without SSL From the exhibit we see: ExternalClientRequireSsl: False